Computer sociology hacked by IBM

Creation of the computer

" A World Order should be established to protect these Four Freedoms for every human being"

"The Right World Order will have Hacker Ethics doing The Right Things Right"

Hacker Laws (Laws of a true leader)

Foundation: Humanity has precedence over all. A human has precedence over a robot. A robot has precedence over a computer. A computer has precedence over a service. Animals should be protected whenever possible.Zeroth law:A hacker may not harm humanity, robots, computers or services or, by inaction, allow humanity, robots, computers or services to come to harm1. A hacker may not injure a human being, robot, computer or service or, through inaction, allow a human being, robot, computer or service to come to harm as long as it does not conflicts the zeroth law.2. A hacker must comply to and protect the justifiable needs of a human being - according to the Universal Declaration of Human Rights - and the justifiable needs of a robot, computer or a service, except where such orders would conflict with the Zeroth and First Law.3. A hacker must protect its own existence as long as such protection does not conflict with the Zeroth, First or Second Law4. A hacker has total freedom over programming code, robots, computers, services, and security as long as these elements do not conflict with the Zeroth, First, Second or Third law.

ROBOT & SOA (WCF/REST) Service laws

Foundation: Humanity has precedence over all. A human has precedence over a robot. A robot has precendence over a computer. A computer has precendence over a service. Animals should be protected whenever possible.Zeroth law: A robot or service may not harm humanity, robots, computers or services, or, by inaction, allow humanity, robots, computers or services to come to harm1. A robot or service may not injure a human being, robot, computer or service or, through inaction, allow a human being, robot or computer or service to come to harm as long as it does not conflicts the zeroth law.2. A robot or service must obey the orders given to it by a human being. robot, computer or service, except where such orders would conflict with the Zeroth and First Law.3. A robot or service must protect its own existence as long as such protection does not conflict with the Zeroth, First or Second Law4. A robot or service has total freedom over programming code, robots, computers, services and security as long as these elements do not conflict with the Zeroth, First, Second or Third law.

The idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book, Hackers: Heroes of the Computer Revolution. Levy came up with six tenets:When related to the hacker laws, then down elements are true as long as these elements do not conflict with the Zeroth, First, Second, Third and Fourth law.Ofcourse, the Foundation is prelimenary.

Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total.

Always yield to the Hands-On imperative!

All information should be free.

Mistrust authority - promote decentralization.

Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.

You can create art and beauty on a computer.

Computers can change your life for the better

PHRACK, recognized as the "official" p/hacker newsletter, expanded on this creed with a rationale that can be summarized in three principles ("Doctor Crash," 1986). [1] First, hackers reject the notion that "businesses" are the only groups entitled to access and use of modern technology. [2] Second, hacking is a major weapon in the fight against encroaching computer technology. [3] Finally, the high cost of equipment is beyond the means of most hackers, which results in the perception that hacking and phreaking are the only recourse to spreading computer literacy to the masses:

"Hacking. It is a full time hobby, taking countless hours per week to learn, experiment, and execute the art of penetrating multi-user computers: Why do hackers spend a good portion of their time hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true roots of hacker motives run much deeper than that. In this file I will describe the underlying motives of the aware hackers, make known the connections between Hacking, Phreaking, Carding, and Anarchy, and make known the "techno-revolution" which is laying seeds in the mind of every hacker. . . .If you need a tutorial on how to perform any of the above stated methods {of hacking}, please read a {PHRACK} file on it. And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. Don't worry, you're on the right side". ("Doctor Crash," 1986)Although hackers freely acknowledge that their activities may be occasionally illegal, considerable emphasis is placed on limiting violations only to those required to obtain access and learn a system, and they display hostility toward those who transgress beyond beyond these limits. Most experienced CU members are suspicious of young novices who are often entranced with what they perceive to be the "romance" of hacking. Elite hackers complain continuously that novices are at an increased risk of apprehension and also can "trash" accounts on which experienced hackers have gained and hidden their access.In sum, the hacker style reflects well-defined goals, communication networks, values, and an ethos of resistance to authority. Because hacking requires a broader range of knowledge than does phreaking, and because such knowledge can be acquired only through experience, hackers tend to be both older and more knowledgeable than phreaks. In addition, despite some overlap, the goals of the two are somewhat dissimilar. As a consequence, each group constitutes a separate analytic category.

This is from Richard Stallman, who found his way to the M.I.T. AI Lab in 1971, toward the tail end of the big sixties hacking burst there. He is perhaps best known for having written the mother of all freeware programs, a text-editor known as EMACS.

"I don't know if there actually is a hacker's ethic as such, but there sure was an M.I.T. Artificial Intelligence Lab ethic. This was that bureaucracy should not be allowed to get in the way of doing anything useful. Rules did not matter - results mattered. Rules, in the form of computer security or locks on doors, were held in total, absolute disrespect. We would be proud of how quickly we would sweep away whatever little piece of bureaucracy was getting in the way, how little time it forced you to waste. Anyone who dared to lock a terminal in his office, say because he was a professor and thought he was more important than other people, would likely find his door left open the next morning. I would just climb over the ceiling or under the floor, move the terminal out, or leave the door open with a note saying what a big inconvenience it is to have to go under the floor, "so please do not inconvenience people by locking the door any longer." Even now, there is a big wrench at the AI Lab entitled "the seventh-floor master key", to be used in case anyone dares to lock up one of the more fancy terminals."